<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Static NAT for DMZ servers. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766436#M496827</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Sir,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; 1.&amp;nbsp; default-gateway of servers 172.16.49.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2. I can ping dmz interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3. But I can't ping ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also i have using your suggested dns 4.2.2.2 but problem is staying.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Sep 2011 06:22:45 GMT</pubDate>
    <dc:creator>Debudas123</dc:creator>
    <dc:date>2011-09-29T06:22:45Z</dc:date>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766434#M496825</link>
      <description>&lt;P&gt;I have two nos. of dmz servers and also have two separate public IP for static NAT&lt;/P&gt;&lt;P&gt;I have configure the following.. but i can't access the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(conf)#access-list outside_access_in extended permit ip any host 115.119.126.x1&lt;/P&gt;&lt;P&gt;asa(conf)#access-list outside_access_in extended permit ip any host 115.119.126.x2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(conf)#access-list dmz_access_in extended permit ip host 172.16.49.8 any&lt;/P&gt;&lt;P&gt;asa(conf)#access-list dmz_access_in extended permit ip host 172.16.49.9 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(conf)#static (dmz,outside) 115.119.126.x1 172.16.49.8 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;asa(conf)#static (dmz,outside) 115.119.126.x2 172.16.49.9 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(conf)#access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;asa(conf)#access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(conf)#route outside 0.0.0.0 0.0.0.0 115.119.126.x&amp;nbsp; 1&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:31:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766434#M496825</guid>
      <dc:creator>Debudas123</dc:creator>
      <dc:date>2019-03-11T21:31:58Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766435#M496826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Debu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have everything configured correct on the ASA, just chcek the Default gateway on the servers and alos try using 4.2.2.2 as the dns server on them. Try accessing the internet again. If it still does not work again, try taking capturs on the ASA to check where the packets are going. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to ping the ISP router?&lt;/P&gt;&lt;P&gt;Are you able to ping the dmz interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to take captures:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-17814"&gt;https://supportforums.cisco.com/docs/DOC-17814&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 06:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766435#M496826</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-29T06:09:35Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766436#M496827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Sir,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; 1.&amp;nbsp; default-gateway of servers 172.16.49.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2. I can ping dmz interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3. But I can't ping ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also i have using your suggested dns 4.2.2.2 but problem is staying.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 06:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766436#M496827</guid>
      <dc:creator>Debudas123</dc:creator>
      <dc:date>2011-09-29T06:22:45Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766437#M496829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Debu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the best way to troubleshoot this would be taking captures on the ASA, apply captures, trying the ISP router, chcek where the packets are dropping, or if you are getting any replies from the ISP router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should be your action plan:&lt;/P&gt;&lt;P&gt;1. Take captures on ASA&lt;/P&gt;&lt;P&gt;2. Take logs on ASA.&lt;/P&gt;&lt;P&gt;3. Try packet-tracer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz tcp 172.116.49.8 23456 4.2.2.2 80 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This output should say allow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 06:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766437#M496829</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-29T06:54:37Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766438#M496832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/7/4/63470-Slide1.JPG" class="jive-image" /&gt; &lt;/P&gt;&lt;P&gt;Dear Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; see the basic layout.......... can u tell me what is the exact configuration ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 07:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766438#M496832</guid>
      <dc:creator>Debudas123</dc:creator>
      <dc:date>2011-09-29T07:09:33Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766439#M496836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Debu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You've got the correct configuration as far as I can see, so as asuggested earlier, take captures:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit host 172.16.49.8 any&lt;/P&gt;&lt;P&gt;access-list cap permit any host 172.16.49.8&lt;/P&gt;&lt;P&gt;access-list cap permit host&amp;nbsp; 115.119.126.x1 any &lt;/P&gt;&lt;P&gt;access-list cap permit any host&amp;nbsp; 115.119.126.x1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capo access-list cap interface outside&lt;/P&gt;&lt;P&gt;cap capd access-list cap interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after applying captures, ping 4.2.2.2 and the ISP router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do:&lt;/P&gt;&lt;P&gt;show cap capd&lt;/P&gt;&lt;P&gt;show cap capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check which side is not reply or dropping the packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try packet-tracer as well:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz tcp 172.116.49.8 23456 4.2.2.2 80 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to ping the ISP router from the ASA??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you also provide the complete config from ASA, you can change the ip's if you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 07:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766439#M496836</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-29T07:18:44Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766440#M496839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Sir,&amp;nbsp;&amp;nbsp; i have also send u the conf.txt file .. one thing is that inside network can access the internet as well as dmz network. And dmz network can access the inside network, but dmz can't access internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 08:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766440#M496839</guid>
      <dc:creator>Debudas123</dc:creator>
      <dc:date>2011-09-29T08:29:30Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766441#M496845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Debu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I havent received any file yet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 08:36:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766441#M496845</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-29T08:36:05Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766442#M496848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Sir,&lt;/P&gt;&lt;P&gt;&amp;nbsp; Please see the configuration that I mention below....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(3)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 172.16.50.1 AD&lt;/P&gt;&lt;P&gt;name 172.16.51.153 Anjan_MAC&lt;/P&gt;&lt;P&gt;name 172.16.50.5 BBerry&lt;/P&gt;&lt;P&gt;name 172.16.51.98 CMD-Sec-Sony&lt;/P&gt;&lt;P&gt;name 172.16.51.52 DevsankarIT-Manager&lt;/P&gt;&lt;P&gt;name 172.16.51.76 DilipBDesai&lt;/P&gt;&lt;P&gt;name 172.16.50.6 Exchange&lt;/P&gt;&lt;P&gt;name 172.16.51.46 Goutam&lt;/P&gt;&lt;P&gt;name 172.16.51.104 Harjinder&lt;/P&gt;&lt;P&gt;name 172.16.51.165 Helpdesk&lt;/P&gt;&lt;P&gt;name 172.16.51.74 ITR&lt;/P&gt;&lt;P&gt;name 172.16.50.4 IWSS&lt;/P&gt;&lt;P&gt;name 172.16.50.0 Inside50&lt;/P&gt;&lt;P&gt;name 172.16.51.0 Inside51&lt;/P&gt;&lt;P&gt;name 172.16.60.0 Inside60&lt;/P&gt;&lt;P&gt;name 172.16.50.3 MSSQL&lt;/P&gt;&lt;P&gt;name 172.16.51.60 Manish&lt;/P&gt;&lt;P&gt;name 172.16.51.23 NP1&lt;/P&gt;&lt;P&gt;name 172.16.51.28 NP2&lt;/P&gt;&lt;P&gt;name 172.16.50.2 OfficeScan&lt;/P&gt;&lt;P&gt;name 172.16.51.35 Rupa-DG&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;name 172.16.49.14 SRV1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;name 172.16.49.15 SRV2&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;name 172.16.51.56 Sandip&lt;/P&gt;&lt;P&gt;name 172.16.51.145 SandipAgarwal&lt;/P&gt;&lt;P&gt;name 172.16.51.150 Siddhartha&lt;/P&gt;&lt;P&gt;name 172.16.51.191 Soumen&lt;/P&gt;&lt;P&gt;name 172.16.60.78 SoumenAdak&lt;/P&gt;&lt;P&gt;name 172.16.51.53 Sourav&lt;/P&gt;&lt;P&gt;name 172.16.51.115 Standby-DBD&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;name 115.119.126.19 StaticSRV1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;name 115.119.126.20 StaticSRV2&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;name 172.16.51.239 VideoConferencing&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 115.119.126.18 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.49.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif manament-only&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group network NetUsers&lt;/P&gt;&lt;P&gt; network-object host Harjinder&lt;/P&gt;&lt;P&gt; network-object host Standby-DBD&lt;/P&gt;&lt;P&gt; network-object host SandipAgarwal&lt;/P&gt;&lt;P&gt; network-object host Siddhartha&lt;/P&gt;&lt;P&gt; network-object host Anjan_MAC&lt;/P&gt;&lt;P&gt; network-object host Helpdesk&lt;/P&gt;&lt;P&gt; network-object host Soumen&lt;/P&gt;&lt;P&gt; network-object host NP1&lt;/P&gt;&lt;P&gt; network-object host NP2&lt;/P&gt;&lt;P&gt; network-object host Rupa-DG&lt;/P&gt;&lt;P&gt; network-object host Goutam&lt;/P&gt;&lt;P&gt; network-object host DevsankarIT-Manager&lt;/P&gt;&lt;P&gt; network-object host Sourav&lt;/P&gt;&lt;P&gt; network-object host Sandip&lt;/P&gt;&lt;P&gt; network-object host Manish&lt;/P&gt;&lt;P&gt; network-object host ITR&lt;/P&gt;&lt;P&gt; network-object host DilipBDesai&lt;/P&gt;&lt;P&gt; network-object host CMD-Sec-Sony&lt;/P&gt;&lt;P&gt; network-object host SoumenAdak&lt;/P&gt;&lt;P&gt;object-group network Servers&lt;/P&gt;&lt;P&gt; network-object host AD&lt;/P&gt;&lt;P&gt; network-object host OfficeScan&lt;/P&gt;&lt;P&gt; network-object host MSSQL&lt;/P&gt;&lt;P&gt; network-object host IWSS&lt;/P&gt;&lt;P&gt; network-object host BBerry&lt;/P&gt;&lt;P&gt; network-object host Exchange&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;access-list dmz_access_in extended permit ip host SRV1 any&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;access-list dmz_access_in extended permit ip host SRV2 any&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip object-group NetUsers any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip object-group Servers any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any 172.16.49.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;access-list outside_access_in extended permit ip any host StaticSRV1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;access-list outside_access_in extended permit ip any host StaticSRV2&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip 172.16.49.0 255.255.255.0 Inside50 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip 172.16.49.0 255.255.255.0 Inside51 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip 172.16.49.0 255.255.255.0 Inside60 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip Inside50 255.255.255.0 172.16.49.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip Inside51 255.255.255.0 172.16.49.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip Inside60 255.255.255.0 172.16.49.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu manament-only 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list dmz_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;static (dmz,outside) StaticSRV1 SRV1 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;static (dmz,outside) StaticSRV2 SRV2 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;access-group dmz_access_in in interface dmz&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 115.119.126.17 1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;route inside Inside50 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route inside Inside51 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route inside Inside60 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 manament-only&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:f659e5e4c1a9c17206a23e6e527a1314&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks...&lt;/P&gt;&lt;P&gt;Debabrata &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 08:47:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766442#M496848</guid>
      <dc:creator>Debudas123</dc:creator>
      <dc:date>2011-09-29T08:47:45Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766443#M496851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Deb,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear local-host 172.16.49.15&lt;/P&gt;&lt;P&gt;clear local-host 172.16.49.14&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try accessing internet again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 08:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766443#M496851</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-29T08:53:58Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766444#M496853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Sir,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; i have already try this and internet is coming but one problem is there.. i can't ping or access the dmz servers from outside ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks....&lt;/P&gt;&lt;P&gt;Debabrata&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 08:57:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766444#M496853</guid>
      <dc:creator>Debudas123</dc:creator>
      <dc:date>2011-09-29T08:57:44Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766445#M496856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Deb,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do not take logs and captures you would never be able to know what is exactly happening on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Previously you mentioned that the dmz server is not able to access the internet but now it seemed to have changed.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Debudas123 wrote:&lt;/P&gt;&lt;BR /&gt;&lt;P&gt;I have two nos. of dmz servers and also have two separate public IP for static NAT&lt;/P&gt;
&lt;P&gt;I have configure the following.. but i can't access the internet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you please explain what is the exact issue that you are facing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. accessing internet from dmz servers or&lt;/P&gt;&lt;P&gt;2. accessing dmz servers from the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 09:02:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766445#M496856</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-29T09:02:58Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766446#M496860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear SIr,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I want to access both...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. accessing internet from DMZ.&lt;/P&gt;&lt;P&gt;2. accessing DMZ servers from outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks..&lt;/P&gt;&lt;P&gt;Debabrata&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 09:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766446#M496860</guid>
      <dc:creator>Debudas123</dc:creator>
      <dc:date>2011-09-29T09:22:31Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766447#M496864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; any update sir........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Debabrata &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 09:46:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766447#M496864</guid>
      <dc:creator>Debudas123</dc:creator>
      <dc:date>2011-09-29T09:46:45Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766448#M496866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Deb,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have told you already a coupple of times to take captures and logs, without it troubleshooting woudl not be possible. Plesae try it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 09:48:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766448#M496866</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-29T09:48:58Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766449#M496867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Ok Sir....&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; just confirm me that the entire configuration is right or not ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks..&lt;/P&gt;&lt;P&gt;Debabrata&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 10:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766449#M496867</guid>
      <dc:creator>Debudas123</dc:creator>
      <dc:date>2011-09-29T10:17:01Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766450#M496868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Its absolutely right, no issues with it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 10:18:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766450#M496868</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-29T10:18:08Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766451#M496869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; one thing is that....&lt;/P&gt;&lt;P&gt;&amp;nbsp; can I use both NAT translation in dmz ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. static (dmz,outside) StaticSRV1 SRV1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (dmz,outside) StaticSRV2 SRV2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Debabrata Das&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 10:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766451#M496869</guid>
      <dc:creator>Debudas123</dc:creator>
      <dc:date>2011-09-29T10:24:49Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766452#M496871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you can use it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SRV1 and SRV2 would take the public ip's StaticSRV1 and StaticSRV2 respectively to go to the internet but vapart from these two host all the other hosts in the dmz woudl take th outside interface public ip to go to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 10:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766452#M496871</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-29T10:29:21Z</dc:date>
    </item>
    <item>
      <title>Static NAT for DMZ servers.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766453#M496873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yes.. t thing u r right...&lt;/P&gt;&lt;P&gt;** when I have using this &amp;gt; &lt;STRONG&gt;nat(dmz) 1 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&amp;nbsp; internet is running for all users in dmz zone. But i cant access or&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; ping&amp;nbsp; the dmz servers from outside( also it is not possible without static nat)&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**when I have using this &amp;gt; &lt;STRONG&gt;static (dmz,outside) StaticSRV1 SRV1 netmask 255.255.255.255&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (dmz,outside) StaticSRV2 SRV2 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;internet is not coming also i cant access the servers from outside..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**when i have using both NAT policy internet is coming (including servers), but i can't access the servers from outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for your information &amp;gt;&amp;gt;&amp;gt; the customer is now using &lt;STRONG&gt;Fortinet 110C &lt;/STRONG&gt;(i have also configured this) and everything is working fine...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2011 10:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-dmz-servers/m-p/1766453#M496873</guid>
      <dc:creator>Debudas123</dc:creator>
      <dc:date>2011-09-29T10:43:42Z</dc:date>
    </item>
  </channel>
</rss>

